WGU C795 OA Notes- Questions
with Correct Answers | Latest
Update 100% Pass
Common Vulnerabilities and Exposures (CVE) - CORRECT ANSWER-Provides
a naming system for describing security vulnerabilities.
Common Vulnerability Scoring System (CVSS) - CORRECT ANSWER-provides a
standardized scoring system for describing the severity of security vulnerabilities.
Common Configuration Enumeration (CCE) - CORRECT ANSWER-provides a
naming system for system configuration issues.
Common Platform Enumeration (CPE) - CORRECT ANSWER-provides a
naming system for operating systems, applications, and devices.
Extensible Configuration Checklist Description Format (XCCDF) - CORRECT
ANSWER-provides a language for specifying security checklists.
Open Vulnerability and Assessment Language (OVAL) - CORRECT ANSWER-
provides a language for describing security testing procedures.
,Vulnerability scans - CORRECT ANSWER-automatically probe systems,
applications, and networks, looking for weaknesses that may be exploited by an
attacker.
differential backup - CORRECT ANSWER-A type of partial backup that involves
copying all changes made since the last full backup. Thus, each new differential
backup file contains the cumulative effects of all activity since the last full backup.
store all files that have been modified since the time of the most recent full
backup. Only files that have the archive bit turned on, enabled, or set to 1 are
duplicated. However, unlike full and incremental backups, the differential backup
process does not change the archive bit.
Electronic Vaulting - CORRECT ANSWER-A storage scenario in which database
backups are transferred to a remote site in a bulk transfer fashion. The remote
location may be a dedicated alternative recovery site (such as a hot site) or simply
an offsite location managed within the company or by a contractor for the purpose
of maintaining backup data
full backup - CORRECT ANSWER-A complete copy of data contained on the
protected device on the backup media.
Full-interruption tests - CORRECT ANSWER-operate like parallel tests, but they
involve actually shutting down operations at the primary site and shifting them to
the recovery site.
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025
,Parallel tests - CORRECT ANSWER-represent the next level in testing and
involve relocating personnel to the alternate recovery site and implementing site
activation procedures.
Simulation tests - CORRECT ANSWER-are similar to the structured walk-
throughs. In simulation tests, disaster recovery team members are presented with a
scenario and asked to develop an appropriate response without shutting down
operations.
Structured walk-through - CORRECT ANSWER-takes testing one step further. In
this type of test, often referred to as a table-top exercise, members of the disaster
recovery team gather in a large conference room and role-play a disaster scenario.
Read-through test - CORRECT ANSWER--simplest type of DRP test
-copies of the DRP is distributed to members of the disaster recovery team (DRT)
for review
-ensures key personnel are aware of their responsibilities and have knowledge
refreshed
-provides a chance for obsolete info to be updated
-helps update personnel lists
T&A training and awareness - CORRECT ANSWER-o Orientation training for all
new employees
, o Initial training for employees taking on a new disaster recovery role for the first
time
o Detailed refresher training for disaster recovery team members
Brief awareness refreshers for all other employees
Disk to Disk - CORRECT ANSWER-disk storage has become increasingly
inexpensive. With drive capacities now measured in terabytes, tape and optical
media can't cope with data volume requirements anymore. Many enterprises now
use disk-to-disk (D2D) backup solutions for some portion of their disaster
recovery strategy.
Software escrow arrangement - CORRECT ANSWER-is a unique tool used to
protect a company against the failure of a software developer to provide adequate
support for its products or against the possibility that the developer will go out of
business and no technical support will be available for the product.
Remote Mirroring - CORRECT ANSWER-Maintaining a live database server at
the backup site. It is the most advanced database backup solution.
Remote Journaling - CORRECT ANSWER-A database backup type which records
at the transaction level
Data transfers still occur in a bulk transfer mode, but they occur on a more
frequent basis, usually once every hour and sometimes more frequently.
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025
with Correct Answers | Latest
Update 100% Pass
Common Vulnerabilities and Exposures (CVE) - CORRECT ANSWER-Provides
a naming system for describing security vulnerabilities.
Common Vulnerability Scoring System (CVSS) - CORRECT ANSWER-provides a
standardized scoring system for describing the severity of security vulnerabilities.
Common Configuration Enumeration (CCE) - CORRECT ANSWER-provides a
naming system for system configuration issues.
Common Platform Enumeration (CPE) - CORRECT ANSWER-provides a
naming system for operating systems, applications, and devices.
Extensible Configuration Checklist Description Format (XCCDF) - CORRECT
ANSWER-provides a language for specifying security checklists.
Open Vulnerability and Assessment Language (OVAL) - CORRECT ANSWER-
provides a language for describing security testing procedures.
,Vulnerability scans - CORRECT ANSWER-automatically probe systems,
applications, and networks, looking for weaknesses that may be exploited by an
attacker.
differential backup - CORRECT ANSWER-A type of partial backup that involves
copying all changes made since the last full backup. Thus, each new differential
backup file contains the cumulative effects of all activity since the last full backup.
store all files that have been modified since the time of the most recent full
backup. Only files that have the archive bit turned on, enabled, or set to 1 are
duplicated. However, unlike full and incremental backups, the differential backup
process does not change the archive bit.
Electronic Vaulting - CORRECT ANSWER-A storage scenario in which database
backups are transferred to a remote site in a bulk transfer fashion. The remote
location may be a dedicated alternative recovery site (such as a hot site) or simply
an offsite location managed within the company or by a contractor for the purpose
of maintaining backup data
full backup - CORRECT ANSWER-A complete copy of data contained on the
protected device on the backup media.
Full-interruption tests - CORRECT ANSWER-operate like parallel tests, but they
involve actually shutting down operations at the primary site and shifting them to
the recovery site.
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025
,Parallel tests - CORRECT ANSWER-represent the next level in testing and
involve relocating personnel to the alternate recovery site and implementing site
activation procedures.
Simulation tests - CORRECT ANSWER-are similar to the structured walk-
throughs. In simulation tests, disaster recovery team members are presented with a
scenario and asked to develop an appropriate response without shutting down
operations.
Structured walk-through - CORRECT ANSWER-takes testing one step further. In
this type of test, often referred to as a table-top exercise, members of the disaster
recovery team gather in a large conference room and role-play a disaster scenario.
Read-through test - CORRECT ANSWER--simplest type of DRP test
-copies of the DRP is distributed to members of the disaster recovery team (DRT)
for review
-ensures key personnel are aware of their responsibilities and have knowledge
refreshed
-provides a chance for obsolete info to be updated
-helps update personnel lists
T&A training and awareness - CORRECT ANSWER-o Orientation training for all
new employees
, o Initial training for employees taking on a new disaster recovery role for the first
time
o Detailed refresher training for disaster recovery team members
Brief awareness refreshers for all other employees
Disk to Disk - CORRECT ANSWER-disk storage has become increasingly
inexpensive. With drive capacities now measured in terabytes, tape and optical
media can't cope with data volume requirements anymore. Many enterprises now
use disk-to-disk (D2D) backup solutions for some portion of their disaster
recovery strategy.
Software escrow arrangement - CORRECT ANSWER-is a unique tool used to
protect a company against the failure of a software developer to provide adequate
support for its products or against the possibility that the developer will go out of
business and no technical support will be available for the product.
Remote Mirroring - CORRECT ANSWER-Maintaining a live database server at
the backup site. It is the most advanced database backup solution.
Remote Journaling - CORRECT ANSWER-A database backup type which records
at the transaction level
Data transfers still occur in a bulk transfer mode, but they occur on a more
frequent basis, usually once every hour and sometimes more frequently.
COPYRIGHT ALL RIGHTS RESERVED ©️ 2025